icon

We found results for “

CVE-2026-23888

Good to know:

icon
icon

Date: January 26, 2026

pnpm is a package manager. Prior to version 10.28.1, a path traversal vulnerability in pnpm's binary fetcher allows malicious packages to write files outside the intended extraction directory. The vulnerability has two attack vectors: (1) Malicious ZIP entries containing "../" or absolute paths that escape the extraction root via AdmZip's "extractAllTo", and (2) The "BinaryResolution.prefix" field is concatenated into the extraction path without validation, allowing a crafted prefix like "../../evil" to redirect extracted files outside "targetDir". The issue impacts all pnpm users who install packages with binary assets, users who configure custom Node.js binary locations and CI/CD pipelines that auto-install binary dependencies. It can lead to overwriting config files, scripts, or other sensitive files leading to RCE. Version 10.28.1 contains a patch.

Severity Score

Severity Score

Weakness Type (CWE)

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-22

Untrusted Search Path

CWE-426

Relative Path Traversal

CWE-23

Top Fix

icon

Upgrade Version

Upgrade to version pnpm - 10.28.1;https://github.com/pnpm/pnpm.git - v10.28.1

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): REQUIRED
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): HIGH
Availability (A): NONE

Do you need more information?

Contact Us